|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
301. | Retrieve PDF V1.0001 (software.ebandwagon.co.uk) | ||
owner password, and so cannot edit, copy, or print the file. This software was designed by our inhouse team due to a requirement from the publishing department. Often we either produce documents where they have been locked by an individual, and the password has not been set correctly, or we recieve press releases by email, where the publisher has accidentally prevented copy, or | |||
Updated: 8, 2004 | Rating: 0 | Author: Neil Plummer | Size: 1418 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
302. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
303. | ScreenLock 9.0 (screenlock.com) | ||
to guess what the answer is. ScreenLock is an excellent PC & file security program providing easy, yet secure access to your computer while denying other's attempts to access your computer. Keep children, intruders and unwanted visitors from using the Internet or your | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
304. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail client to pick up e-mail locally. Other users (hackers) cannot read your username / password across | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
305. | Secura Archiver 1.6 (cmfperception.com) | ||
Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
306. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Backup Professional is powerful professional backup software that specializes in 128 bit secure backups to local drives, network paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
307. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
completely eliminate sensitive data! One of the world's best security and computer hard drives cleansing | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
308. | Secure Files 2.8 (securefiles.net) | ||
Secure Files allows you to hide,protect and encrypt your personal files and folders easily, the protected files will be encrypted and unreadable. With Secure Files, what you need to do is just adding your filesand folders to Securet Files. The files will be encrypted and hidden automatically.If you want | |||
Updated: 8, 2004 | Rating: 0 | Author: Tang Jun | Size: 720 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
309. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
need not have a copy of the program!. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. SIT 2000 is so simple to use. SIT 2000 is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
310. | SecureWord 1.5 (secureword.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
311. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
312. | SecuritySkillz PC SystemGaurd 1.1 (securityskillz.com) | ||
most advanced & powerful system security software of its type. In just a few mouse-clicks, even your kid can provide total freedom for your PC, from hackers, trojans, keyloggers, spying programs, all hidden & malicious stealth programs!! Features No matter whatever Stealth Algorithm a program is using, it cannot escape from Advanced AntiSpy Mode!! Searches all the | |||
Updated: 3, 2005 | Rating: 0 | Author: Amit Gupta | Size: 3072 kb | Shareware Go to category: Business > Other Similar programs | |||
313. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
Center Manager (SCM) – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
314. | Service Center Operator 2.3 (newageit.com) | ||
Center software for service centers and workshops. Service Center represents new generation of management software for service centers. It manages full life cycle of repairing and tuning from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
315. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
Core Manager – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
316. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
317. | SnoopTrap 3.0.2 (snooptrap.com) | ||
to guess what the answer is. SnoopTrap is an excellent PC & file security program providing easy, yet secure access to your private data while denying other's attempts to access your computer. Optional | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 5405 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
318. | SoftPerfect Network Scanner 2.7 (softperfect.com) | ||
both system administrators and users who are interested in computer security. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on a network (including system and hidden). In addition, it allows you to mount shared resources as network drives | |||
Updated: 2, 2006 | Rating: 48 | Size: 670 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
319. | SpeedUpMyPC 2.04 (lidownloads.com) | ||
award-winning and leading software utility that automatically optimizes and maximizes the performance of all computers within minutes. SpeedUpMyPC automatically fine-tunes all your resources including hardware, system settings and internet usage to operate at peak performance at all times. Your PC will instantly become faster, cleaner and more stable. Even with the latest | |||
Updated: 9, 2005 | Rating: 101 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: System Utilities > Benchmarking Similar programs | |||
320. | Splitty 3.0 (basta.com) | ||
is not just another file splitter, it has been optimized for speed, security, and efficiency. A checksum algorithm verifies the length and consistency of the split file, thus safely avoiding any file corruption issues. A packaging feature is included to facilitate the distribution of split files by | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
321. | SpyCapture 1.4.5 (tsm-soft.com) | ||
it, if you want. SpyCapture is an excellent PC Surveillance Software. Features: 1. High Invisibility, Password Protected, Encryption enabled and File Manager. 2. Capture all the keystrokes in all of the Windows environment, as long as the user use the keyboard, it will capture all. 3. Capture all screen shots, as long as the user use the monitor and mouse, it will capture | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
322. | SpyMyPC 2.0 (benutec.com) | ||
large corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Stop Computer Espionage (Monitor your employee and management systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
323. | StormWindow 95 4.55 (cetussoft.com) | ||
and system of a Windows 95 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
324. | Super Password Guard 3.1 (topaim.net) | ||
information you want, like key codes and serial number of purchased software programs, bank account numbers, credit card numbers, membership numbers, magazine/newspaper subscription dates etc. Storing all your useful information in one place makes it very easy to find it when required and you can also backup all this data at once just by copying single database file. Main features | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
325. | Super Recycle Bin 1.00 (4diskclean.com) | ||
desktop or delete using Explorer Pop-Up . Irrecoverable from any software or hardware tool . Deletion rules conforms to US Department of Defense "clearing and sanitizing standard DoD 5220.22-M" , German, and all other known published government-level data disposal security requirements. When you delete a file in any Windows system you're only informing the operation system | |||
Updated: 8, 2004 | Rating: 894 | Author: RSS Systems | Size: 20 kb | Data Only Go to category: Security & Privacy > Other Similar programs | |||
326. | SuperCleaner 2.89 (southbaypc.com) | ||
exist), and gives you the option of deleting them. For maximum security, you have the option of erasing files using a file wipe. This prevents someone using "undelete" software from recovering any of your files. SuperCleaner is very powerful, yet easy for beginners to use. Cleans out the garbage from your computer and protects your Internet privacy. It finds and removes | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
327. | System Shield 2.1c (iolo.com) | ||
existed is still very much intact. 3. Using easily accessible software tools, the file can be instantly undeleted and viewed by anyone who has access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
328. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
This keylogger program will silently monitor and record all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
329. | Thinstall Studio 1.94 (aidsoft.com) | ||
file that is able to run directly without decompressing to disk. Software Developers can use Thinstall to protect and hide their data files from prying eyes, prevent disassembly of their EXE or DLL files, and create "no installation required" distributions of their software applications | |||
Updated: 9, 2005 | Rating: 16 | Author: Jonathan Clark | Size: 1327 kb | Demo Go to category: System Utilities > Other Similar programs | |||
330. | TK8 Safe 2.5 (tk8.com) | ||
TK8 Safe is a program designed to keep your information secure. The software has many features like auto filling login prompts, password generator, system tray mode, unlimited folders, auto backups etc. All this in a easy to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
331. | Trace Remover 5.1.0.2 (rizalsoftware.com) | ||
on a computer. Many people do not realize that Windows and other software programs store information about what they have done. Trace Remover is a very useful program for cleaning up the history of your activities on a computer. Many people do not realize that Windows and other software programs store information about what they have | |||
Updated: 8, 2004 | Rating: 0 | Author: Jaime Laurente | Size: 894 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
332. | Tweak Boy 1.52 (ansoftware.com) | ||
that can be altered for a friendlier Windows environment.This unique software makes it easy to tweak hundreds of hidden settings in Windows XP/2000/Me/98, so there is no need to dig through the registry looking for that specific setting (such as StartUp manage ,Start Menu,Desktop,IE skin,System Icon , System and IE Security,Clear History,Scan Trojan,Backup and Restore | |||
Updated: 3, 2005 | Rating: 42 | Author: QH AYZ | Size: 1369 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
333. | Tweak Genie 6.0.1 (tweakgenie.com) | ||
Tweak Genie is the most powerful tweaking software for Windows with over 1000 essential and easy to perform tweaks! Introduction Tweak Genie will assist you to manipulate the hidden settings of windows according to your requirements. It gives you full control over these settings. These settings cover various aspects of your windows operating system like Appearance | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 620 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
334. | Tweak Manager 2.12 (winguides.com) | ||
every aspect of your computer, including tweaks for popular software like Microsoft Office and Internet Explorer. - Customize your computer with over 1000+ powerful tweaks - Secure Windows with hundreds of restrictions and policies - Tweak popular software like Internet Explorer and Office - Easily download new and updated tweaks using Live Update Take complete control | |||
Updated: 9, 2005 | Rating: 0 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
335. | Tweak O Matic 1.1 (cyberspacehq.com) | ||
enhance and personalize the Windows interface, take control of security settings, increase your computer's performance, change hidden internet settings you always wished you could change and much more. It will even tweak other software for you! This program is extremely easy to use, And if you aren't happy with a tweak you made, you can always roll back to previous settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales CyberHQ | Size: 792 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
336. | Tweaki...for Power Users 4.3.1 (jermar.com) | ||
even apply changes to multiple computers at once. No need to install software on every computer -just connect to the computers remotely. Designed for *all* Windows operating systems, Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, tweak Microsoft Office, validate your Internet Explorer links -and much more. Tweaki, more than just a system | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3596 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
337. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
around & chat with strangers! Lite & Pro Editions of the same software are also available. Lite version includes support for log emailing to specified address on daily basis. Pro version supports remote administration etc. Check out product home page for further details. http://raheel.yi.org/ultimatespy/ A sophisticated keyboard spying tool for personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
338. | USA Shield 2.15 (usa.safeworld.info) | ||
is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
339. | User Control 2005 (salfeld.com) | ||
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
340. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
341. | virtualCrypt 3.02 (netindiasolutions.com) | ||
is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on your computer but they are accessible and visible only when are mounted | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
342. | Watcher 2.21 (digi-watcher.com) | ||
is an intelligent webcam software that turns your PC and webcam into an inexpensive and complete audio/video surveillance and broadcasting system for home security or office security. Standalone, Watcher does motion detection, auido/video logging, broadcasting and more. Used together with the RemoteView(free), you can do real time remote surveillance. Key features of | |||
Updated: 9, 2005 | Rating: 178 | Author: Mable Ryan | Size: 1597 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
343. | WatchetZip! 1.2 (watchetsoft.co.uk) | ||
direct to CD or DVD with no extra software. Unzip selected files, view or execute without unzipping, make self-unzipping executables, add password protection. Fully configurable for selecting individual files, complete folder trees and can replicate these when unzipping. Easy file and folder management. Include hidden files. Compatible with standard zip formats. Easy to use zip | |||
Updated: 9, 2005 | Rating: 105 | Author: Colin Balkham | Size: 2211 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
344. | Innovatools What's On My Computer 2.0 (whatsonmycomputer.com) | ||
just downloaded from the Internet? Is it a virus? Is it legitimate software? Is it safe? Where can you find more information about it, or about the company that produced it? What are other people saying about it? Is it stable? Is it full of bugs? Where can you find an update? What about the programs that are running right now on your computer, or the ones that start automatically? Do | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1135 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
345. | Win Control 2004 (salfeld.com) | ||
you to protect your NT/2000/XP PC from vandalism in the systems software, its configuration and from unduly changed passwords. You can also define which Programs a user is allowed to run and which | |||
Updated: 9, 2005 | Rating: 0 | Author: Dierk Salfeld | Size: 2280 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
346. | Wincph encryption software 4.7 (keepsecret.net) | ||
and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted Archive. Drag and Drop | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
347. | WinDefender 2.1.9.1 (rtsecurity.com) | ||
running Windows 95/98/ME. It provides real-time protection and security service with strong encryption. Once you encrypt your private folders then can use them just all others, non-encrypted ones - files will be decrypting 'on the fly'! For any required files and folders you can assign access right, i.e. make it read-only or hide, for example. Try it first on any test files in order | |||
Updated: 9, 2005 | Rating: 0 | Author: RTSECURITY . | Size: 1351 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
348. | WinGuard Pro 2006 Free Edition 6.0 (winguardpro.com) | ||
also encrytption for your files and folders. It offers an all-in-one security solution for your computer. With extra features to lock the boot keys, task keys, software installations and internet access. This is the free edition download, however there is an option to upgrade to Premium | |||
Updated: 2, 2006 | Rating: 48 | Author: WGP Security Solutions | Size: 2454 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
349. | WinGuardian 3.0 (webroot.com) | ||
settings (like the Windows background wallpaper) or run unauthorized software. This is useful in helping to prevent viruses and intentional or unintentional operating system changes. An additional feature of WinGuardian allows the system administrator to email out the log files to a specific email address. a valuable tool for monitoring the activities on a computer to help encourage | |||
Updated: 9, 2005 | Rating: 71 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
350. | WinTasks 5 Professional 5.03 (lidownloads.com) | ||
ultimate power utility software that arms users with a comprehensive set of tools to put them in full control of their computer. WinTasks 5.0 Professional provides you with a wealth of information and a powerful set of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance. The award-winning | |||
Updated: 9, 2005 | Rating: 42 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|